2013/1/10 Baron Fujimoto :
> On Wed, Jan 09, 2013 at 01:08:01PM +0400, Konstantin Kolinko wrote:
>>2013/1/9 Baron Fujimoto :
>>> I'm attempting to mitigate BEAST (CVE-2011-3389) attacks on Tomcat 6.0.35.
>>> My understanding is that the attack applies only to CBC ciphers, and that
>>> RC4 ciphers a
Hi All,
We would like to convert our SSL connector from JSSE configuration to
APR/native. The tomcat version we are using is tomat7.0.27.
We are finding difficulty in converting our .jks file to SSLCertificateFile and
SSLCertificateKeyFile attributes which are specified as part of connector fo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Martin,
On 1/9/13 6:27 PM, Martin Gainty wrote:
>
> how does one divine EPR change from APR to AJP or NIO based on
> keystoreType?
Great, now /you/ are in on the quantum mechanics jokes around here? *sigh*
> if we use curl --key-type Private key
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Baron,
On 1/9/13 5:22 PM, Baron Fujimoto wrote:
> On Wed, Jan 09, 2013 at 01:08:01PM +0400, Konstantin Kolinko
> wrote:
>> You should look into Java documentation for their cipher names.
>>
>> See this thread from October 2009:
>> http://markmail.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Leon,
On 1/9/13 5:37 PM, leon.m...@hccnet.nl wrote:
> Op Wo, 9 januari, 2013 10:37 pm schreef Christopher Schultz: Tried
> to creat a context.xml in META-INF/context.xml, however, not sure
> about the full conten.
>
> Are you able to provide met a
how does one divine EPR change from APR to AJP or NIO based on keystoreType?
if we use curl --key-type Private key file type (DER/PEM/ENG)
there is NO relationship to EPR implementation because there is no EPR curl is
implementing
what does keystoreType have to do with the choice of EPR ?
exp
Op Wo, 9 januari, 2013 11:48 pm schreef Mark Eggers:
> On 1/9/2013 1:37 PM, Christopher Schultz wrote:
>
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA256
>>
>>
>> Leon,
>>
>>
>> On 1/9/13 4:25 PM, leon.m...@hccnet.nl wrote:
>>
>>> I'm quite new with tomcat. I run 7.0.30.
>>>
>>
>> Welcome. 7.0
On 1/9/2013 1:37 PM, Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Leon,
On 1/9/13 4:25 PM, leon.m...@hccnet.nl wrote:
I'm quite new with tomcat. I run 7.0.30.
Welcome. 7.0.35 will likely be released shortly. Please upgrade when
you can.
I have successfully ins
Chris,
Tx for your reply
Op Wo, 9 januari, 2013 10:37 pm schreef Christopher Schultz:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
>
> Leon,
>
>
> On 1/9/13 4:25 PM, leon.m...@hccnet.nl wrote:
>
>> I'm quite new with tomcat. I run 7.0.30.
>>
>
> Welcome. 7.0.35 will likely be released sho
On Wed, Jan 09, 2013 at 01:08:01PM +0400, Konstantin Kolinko wrote:
>2013/1/9 Baron Fujimoto :
>> I'm attempting to mitigate BEAST (CVE-2011-3389) attacks on Tomcat 6.0.35.
>> My understanding is that the attack applies only to CBC ciphers, and that
>> RC4 ciphers are not vulnerable, so I am attemp
not Resource..but Realm
http://tomcat.apache.org/tomcat-7.0-doc/realm-howto.html#JDBCRealm
for Hibernate:
specify the hibernate attributes in either hibernate.properties or
hibernate.cfg.xml (and place on classpath)
hibernate.connection.driver_classJDBC driver classhibernate.connec
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Leon,
On 1/9/13 4:25 PM, leon.m...@hccnet.nl wrote:
> I'm quite new with tomcat. I run 7.0.30.
Welcome. 7.0.35 will likely be released shortly. Please upgrade when
you can.
> I have successfully installed an application, however i'm facing
> issue
I'm quite new with tomcat.
I run 7.0.30.
I have succesfully installed an application, however i'm facing issues
with the database connection.
As i understood i added the following code to server.xml
Unfortunately I'm Getting below error.
Don't get any special information from the log.
On Wed, Jan 9, 2013 at 2:19 PM, Mark Thomas wrote:
> It varies. There is normally a link advertised on the conference web
> site. For the most recent ApacheCon (EU 2012) you want:
> http://archive.apachecon.com/eu2012/presentations/
>
> Others should be available id you start here:
> http://archi
On 09/01/2013 18:37, Howard W. Smith, Jr. wrote:
> Chris,
>
> On Wed, Jan 9, 2013 at 10:33 AM, Christopher Schultz <
> ch...@christopherschultz.net> wrote:
>
>> Mark Thomas is giving a talk at ApacheCon (Portland, OR, USA, 26 Feb
>> 2013) about Clustering Tomcat[1]. If you can make it, please joi
Chris,
On Wed, Jan 9, 2013 at 10:33 AM, Christopher Schultz <
ch...@christopherschultz.net> wrote:
> Mark Thomas is giving a talk at ApacheCon (Portland, OR, USA, 26 Feb
> 2013) about Clustering Tomcat[1]. If you can make it, please join him.
> If not, I'm sure his slides will be available afterw
About the mail client, I am just unable to add a > or anything to the line
automatically, so it gets confusing quickly if I post as I normally would. Now
back to the issue:
My confusion was that I was unsure how have a mount allowed it to communicate.
I hadn't really considered that the mount w
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Howard,
On 1/9/13 9:40 AM, Howard W. Smith, Jr. wrote:
> On Wed, Jan 9, 2013 at 8:28 AM, Daniel Mikusa
> wrote:
>
>> This is a good article that explains the different ways to proxy
>> to an Apache HTTPD server. It's a little old, but still good.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Vicky,
On 1/9/13 9:06 AM, vi...@thepenguin.org wrote:
> I appreciate your reply and apologize for the top post (am using a
> stupid mail client from work).
You can't just press the /down/ arrow key a few times? *shrug*
> Your answer gets me part
Hi.
Let me just add a bit to Daniel's outline below.
vi...@thepenguin.org wrote:
Hi Daniel:
I appreciate your reply and apologize for the top post (am using a stupid mail
client from work). Your answer gets me part way there, but what is the most
confusing to me is the use of JkMount. How doe
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Martin,
On 1/9/13 8:33 AM, Martin Gainty wrote:
> org.apache.tomcat.util.net.AprEndpoint protected String
> SSLCipherSuite = "ALL"; public String getSSLCipherSuite() { return
> SSLCipherSuite; } public void setSSLCipherSuite(String
> SSLCipherSuite)
On Jan 9, 2013, at 9:06 AM, vi...@thepenguin.org wrote:
> Hi Daniel:
>
> I appreciate your reply and apologize for the top post (am using a stupid
> mail client from work). Your answer gets me part way there, but what is the
> most confusing to me is the use of JkMount. How does that fit into t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Baron,
On 1/8/13 9:55 PM, Baron Fujimoto wrote:
> However, when I test this by attempting connections with a
> script[*]
You could use 'sslscan' which is available directly from many Linux
package managers. You can also use online tools like Qualys
On Wed, Jan 9, 2013 at 8:28 AM, Daniel Mikusa wrote:
> This is a good article that explains the different ways to proxy to an
> Apache HTTPD server. It's a little old, but still good.
>
>
> http://www.tomcatexpert.com/blog/2010/06/16/deciding-between-modjk-modproxyhttp-and-modproxyajp
>
Interes
Hi Daniel:
I appreciate your reply and apologize for the top post (am using a stupid mail
client from work). Your answer gets me part way there, but what is the most
confusing to me is the use of JkMount. How does that fit into the picture from
a communication perspective. I hope this question
Baron org.apache.catalina.connector.Connector: public void setProtocol(String
protocol) {if (AprLifecycleListener.isAprAvailable()) {
if ("HTTP/1.1".equals(protocol)) {
setProtocolHandlerClassName
("org.apache.coyote.http11.Http11AprProtoco
On Jan 9, 2013, at 7:31 AM, vi...@thepenguin.org wrote:
> Hello:
>
> I am seeking to understand the differences between using mod_jk and mod_ajp
> and mod_proxy_ajp.
This is a good article that explains the different ways to proxy to an Apache
HTTPD server. It's a little old, but still good.
Hello:
I am seeking to understand the differences between using mod_jk and mod_ajp and
mod_proxy_ajp. Ideally I would love to see a diagram of communication between
apache and tomcat, but I haven't found anything like that. I want to confirm my
understanding of the data flow. Can someone explai
2013/1/9 Baron Fujimoto :
> I'm attempting to mitigate BEAST (CVE-2011-3389) attacks on Tomcat 6.0.35.
> My understanding is that the attack applies only to CBC ciphers, and that
> RC4 ciphers are not vulnerable, so I am attempting to restrict the set of
> ciphers that Tomcat uses with the followin
29 matches
Mail list logo